Jean-Philippe Wary

Orcid: 0000-0002-6642-1452

According to our database1, Jean-Philippe Wary authored at least 27 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Chase-escape in dynamic device-to-device networks.
J. Appl. Probab., March, 2024

2023
Connectivity in Mobile Device-to-Device Networks in Urban Environments.
IEEE Trans. Inf. Theory, November, 2023

Position Paper: Strengthening Applets on Legacy SIM Cards with Singularization, a New Moving Target Defense Strategy.
Proceedings of the Mobile, Secure, and Programmable Networking, 2023

Demonstrating Liability and Trust Metrics for Multi-Actor, Dynamic Edge and Cloud Microservices.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

2022
TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuum.
Proceedings of the 8th IEEE International Conference on Network Softwarization, 2022

Security Constraints for Placement of Latency Sensitive 5G MEC Applications.
Proceedings of the 9th International Conference on Future Internet of Things and Cloud, 2022

The Owner, the Provider and the Subcontractors: How to Handle Accountability and Liability Management for 5G End to End Service.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Verticals in 5G MEC-Use Cases and Security Challenges.
IEEE Access, 2021

2020
Malware propagation in urban D2D networks.
Proceedings of the 18th International Symposium on Modeling and Optimization in Mobile, 2020


Liability-Aware Security Management for 5G.
Proceedings of the 3rd IEEE 5G World Forum, 2020

2018
Towards constructive approach to end-to-end slice isolation in 5G networks.
EURASIP J. Inf. Secur., 2018

Assessing the risk of complex ICT systems.
Ann. des Télécommunications, 2018

A Security Architecture for 5G Networks.
IEEE Access, 2018

Ensuring IoT Security with an Architecture Based on a Separation Kernel.
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018

2017
Diet-ESP: IP layer security for IoT.
J. Comput. Secur., 2017

Security and Resilience in 5G: Current Challenges and Future Directions.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A New Threat Assessment Method for Integrating an IoT Infrastructure in an Information System.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

On end-to-end approach for slice isolation in 5G networks. Fundamental challenges.
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, 2017

2016
A new approach to investigate IoT threats based on a four layer model.
Proceedings of the 13th International Conference on New Technologies for Distributed Systems, 2016

Experimental studies of a graphical authentication system based on semantic categorisation.
Proceedings of the Actes de la 28ième conférence francophone sur l'Interaction Homme-Machine, 2016

A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
Internet of Things: A Definition & Taxonomy.
Proceedings of the 9th International Conference on Next Generation Mobile Applications, 2015

Recommendations for IPsec Configuration on Homenet and M2M Devices.
Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2015

Virtual Keyboard Logging Counter-Measures Using Human Vision Properties.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

2013
Flying over Mobile Clouds with Security Planes: Select Your Class of SLA for End-to-End Security.
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013

2011
Evaluation of the Ability to Transform SIM Applications into Hostile Applications.
Proceedings of the Smart Card Research and Advanced Applications, 2011


  Loading...